100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D487 EXAM QUESTIONS & ANSWERS

Rating
-
Sold
-
Pages
5
Grade
A+
Uploaded on
30-05-2025
Written in
2024/2025

WGU D487 EXAM QUESTIONS & ANSWERS

Institution
D487
Course
D487









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
D487
Course
D487

Document information

Uploaded on
May 30, 2025
Number of pages
5
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU D487 EXAM QUESTIONS & ANSWERS
A1 - Security Assessment - Answers :Is the first phase of SDL. This is the phase in
which the project team identifies the project risk profile and the needed SDL activities, in
some SDLs it is called the discovery phase.

A2- Architecture - Answers :At this stage of the SDL, security is looked at more in terms
of business risks, which inputs from the software security group and discussions with
key stakeholders in the SDLC.

A3 - Design and Development - Answers :In this phase the end user of your software is
foremost in your mind. During this phase, you will do an analysis of policy compliance,
create the test plan documentation, , update your threat models if necessary, conduct a
design security analysis, and do a privacy implementation assessment so you can make
informed decisions about how to deploy your software securely and establish
development best practices to detect and remove security and privacy issues early in
the development lifecycle.

A4 - Design and Development - Answers :This phase can be mapped to the "readiness"
phase in a typical software development life cycle (SDLC). In this phase we start the
continuation of policy compliance analysis.

A5 - Ship - Answers :In the final policy compliance review, the SDL policy will be
reviewed to ensure that the policy provides specific requirements based on different
development criteria, such as product type, code type, and platform. A vulnerability scan
will look for any remaining vulnerabilities in your software and associated systems and
report potential exposure.

Scrum Master - Answers :A person who ensures that the team is productive, facilitates
the daily Scrum, enables close cooperation across all roles and functions, and removes
barriers that prevent the team from being effective

Product Owner - Answers :Key stakeholder. Represents the users you're building the
solution for. Often someone from the product management or marketing department.

Scrum Team - Answers :A small group of up to 9 cross-functional developers that is
responsible for developing, testing, and delivering software at the end of a scrum sprint.
The team determines a sprint's major goals and deliverables.

Scrum Ceremonies - Answers :Sprint Planning - Product owner top ideas
Sprint Review - Shows what accomplished during sprint
Sprint Retrospective - How well is scrum working
Daily Scrum - Helps the team stay on track

Scrum Artifacts - Answers :Product Backlog - List of desired features for a product
Sprint backlog - List of tasks to be completed

, Burndown Chart - Updated after every sprint

Sprint - Answers :A fixed length of time period in which a specific set of work is
completed. It is a time-boxed iteration, typically lasting between one to four weeks, with
two weeks being the most common duration.

DREAD - Answers :D - Damage Potential - How catastrophic is the event?
R - Reproducibility - How easy to reproduce the attack?
E - Exploitability - How easy to launch the attack?
A - Affected Users - What percentage of users are affected?
D - Discoverability - How easy it is to find the vulnerability?

STRIDE-Per-Element - Answers :Concentrates on each element of a diagram. Based
on threats common to each type of element.

STRIDE-Per-Interaction - Answers :Concentrates on the interactions of a system. Leads
to threats that are easier to understand.

OCTAVE - Answers :Operationally
Critical
Threat
Asset
Vulnerability Evaluation

*Risk Analysis Framework

*Evaluates Organizations

PASTA - Answers :Process for
Attack
Simulation
Threat Analysis

*Targeted towards medium to large sized companies
*Mature companies
*Having security knowledge
*Iterative
*Outcome is geared towards management

STRIDE Model - Answers :S - Spoofing - How do we ensure a users authenticity?

T - Tampering - How do we check the integrity of our data?

R - Repudiation - How do we audit actions in our systems?

I - Information Disclosure - How do we keep data confidential?

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
GEEKA YALA UNIVERSITY
View profile
Follow You need to be logged in order to follow users or courses
Sold
2011
Member since
3 year
Number of followers
1447
Documents
48584
Last sold
5 hours ago

3.8

345 reviews

5
172
4
61
3
44
2
16
1
52

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions